Crypt2phile - AES Encryption

Description

Crypt2phile (for smartphones) is a convenient, simple-to-use proprietary text encryption platform that utilizes its own SQLite database for data archiving.
Data ciphering logic uses AES, the Advanced Encryption Standard, which is a 128-bit ...Read more

Description

Crypt2phile (for smartphones) is a convenient, simple-to-use proprietary text encryption platform that utilizes its own SQLite database for data archiving.

Data ciphering logic uses AES, the Advanced Encryption Standard, which is a 128-bit symmetric-key text encryption specification that was approved by the U.S. National Institute of Standards and Technology in 2002, and is used by the U.S. government and other institutions worldwide.

By using other Android apps, your encrypted data can be posted on the Web or transmitted to other Android devices around the globe. The destination receivers would use their own Crypt2phile app (see note below) and your previously-disclosed encryption key(s) to decipher the forwarded message.

If you don't distribute your cipher texts, then you can save them in a SQLite database on your own Android smartphone. The information is stored in 'folders' where it can later be individually retrieved and decrypted to reveal your old confidential notes. (A maximum of 5 'folders' are permitted with this free app.)

NOTES: If you discover you need more than 5 'folders', download the app: Cryptxphile. The tablet-targeted CryptxHD and CryptxHDx apps, and the smartphone-targeted Cryptxphile and Crypt2phile apps may all be used to decrypt any AES+ data file. Be aware that Triple-DES strings can not be decrypted by the AES algorithm, and vice versa.

Caveat: Mix together enough mathematicians, cryptographers, CPU's, and research time in a computer lab and you'll discover any encrypted text on planet Earth can be deciphered. Therefore, don't expect to find an "uncrackability" guarantee with this app! But by combining an off-the-shelf encryption algorithm with multiple private keys and unlimited recursion, hackers will be repulsed from even attempting to brute-force-attack your ciphered texts.